You can feel confident that Business Security is based on a layered next-gen endpoint protection platform with the industry’s best prevention, detection and blocking capabilities, using proven machine learning techniques, behavioral analysis and continuous monitoring of running processes. Feel secure!
Multi-layered next-gen security solution, that consistently provides best-in-class prevention,detection and remediation against all kind of threats
● Uses machine learning, advanced heuristics,advanced anti-exploit and other proprietary techniques to protect endpoints
● Best protection and performance according to independent industry tests
● proactive hardening and risk analytics to reduce the attack surface
● Network based security to stop attacks aiming to gain access to the system by exploiting network vulnerabilities.
Machine learning techniques use well-trained machine models and algorithms to predict and block advanced attacks. Bitdefender’s machine learning models use 40,000 static and dynamic features and are continuously trained on billions of clean and malicious file samples gathered from over 500 million endpoints globally. This dramatically improves the effectiveness of malware detection and minimizes false positives.
Process Inspector operates in zero-trust mode, continuously monitoring all processes running in the operating system. It hunts for suspicious activities or anomalous process behavior, such as attempts to disguise the type of process, execute code in another process’s space (hijack process memory for privilege escalation), replicate, drop files, hide from process enumeration applications and more. It takes appropriate remediation actions, including process termination and undoing changes the process made. It is highly effective in detecting unknown advanced malware, including ransomware.
Exploit prevention technology protects the memory and vulnerable applications such as browsers, document readers, media files and runtime (ie. Flash, Java). Advanced mechanisms watch memory access routines to detect and block exploit techniques such as API caller verification, stack pivot, return-oriented-programming (ROP) and others. GravityZone’s technology is equipped to tackle advanced, evasive exploits that targeted attacks rely on to penetrate an infrastructure.